Publications

Last updated: Friday, 10-Jul-2020 13:13:55 JST

< Refereed Journals >
  1. Ryoya Saito, Toshihiro Yamauchi,
    Method to Reduce Redundant Security Policy Using SELinux CIL,
    IPSJ Journal, Vol.61, No.9, (9, 2020). (to appear)

  2. Akifumi Fukumoto, Toshihiro Yamauchi,
    Privilege Escalation Attack Prevention Method Focusing on Privilege Changes in Guest OS on KVM,
    IPSJ Journal, Vol.61, No.9, (9, 2020). (to appear)

  3. Ryota Yoshitani, Toshihiro Yamauchi,
    Privilege Escalation Attack Prevention Methodby Focusing on Privilege Changes on 64-bit ARM,
    IPSJ Journal, Vol.61, No.9, (9, 2020). (to appear)

  4. Hiroki Kuzuno, Toshihiro Yamauchi,
    Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism,
    IEICE Transactions on Information and Systems, Vol.E103-D, No.7, pp.1462-1475 (7, 2020).
    DOI: 10.1587/transinf.2019ICP0011 (Open Access)

  5. Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto,
    Additional Kernel Observer: Privilege Escalation Attack Prevention Mechanism Focusing on System Call Privilege Changes,
    International Journal of Information Security, (6, 2020).
    DOI: 10.1007/s10207-020-00514-7 (Open Access)

  6. Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi,
    Support System for Assessing Anti-analysis JavaScript Code by Using Proxy Objects,
    IPSJ Journal, Vol.61, No.6, pp.1134-1145 (6, 2020). (in Japanese)

  7. Toshihiro Yamauchi, Yuuki Fukushima, Yoshinari Nomura, Hideo Taniguchi,
    Method for Delegating I/O Functions to Linux in AnT Operating System,
    IPSJ Journal, Vol.60, No.12, pp.2279-2290 (12, 2019). (in Japanese)

  8. Masao YAMAMOTO, Kohta NAKASHIMA, Toshihiro YAMAUCHI, Akira NAGOYA, Hideo TANIGUCHI,
    Decentralization of Performance Profiling System Using Virtual Machines and Reduction of Stall Time of Data Sampling,
    IEICE Transactions on Information and Systems, Vol.J102-D, No.10, pp.674-684 (10, 2019).
    DOI: 10.14923/transinfj.2018JDP7035

  9. Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
    Design and Implementation of Hiding Method for File Manipulation of Essential Services by System Call Proxy using Virtual Machine Monitor,
    International Journal of Space-Based and Situated Computing, vol.9, no.1, pp.1-10, (5, 2019).
    DOI: 10.1504/IJSSC.2019.100007

  10. Masaya Sato, Hideo Taniguchi, Yuuki Muraoka, Toshihiro Yamauchi,
    Implementation and Evaluation of Batch Processing Request for Leveraging Distributed Execution of OS Processing,
    IPSJ, Vol.60, No.2, pp.430-439, (2, 2019). (in Japanese)

  11. Toshihiro Yamauchi, Yusuke Tokimatsu, Hideo Taniguchi
    Live Forensic Method Using Process Duplication to Maintain High System Availability,
    IPSJ Journal, Vol.60, No.2, pp.696-705, (2, 2019). (in Japanese) (Specially selected paper of IPSJ Journal)

  12. Yuuto Kamou, Toshihiro Yamauchi, Hideo Taniguchi,
    Priority Inversion Preventing by the Scheduler Cooperation in Multi-core Environment,
    IEICE Transactions on Information and Systems, Vol.J101-D, No.6, pp.998-1008 (6, 2018). (in Japanese)
    DOI: 10.14923/transinfj.2017JDP7061

  13. Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin,
    Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications,
    Journal of Information Processing, Vol.26, pp.396-405 (5, 2018).
    DOI: 10.2197/ipsjjip.26.396 [PDF]

  14. Kazutoshi Yokoyama, Akiyoshi Tsuchiya, Koichi Yamamoto, Seiya Kawabe, Toshihiro Yamauchi, Yoshinari Nomura, Hideo Taniguchi,
    I/O Buffer Partitioning Using Buffer Access Information for Directory Oriented Buffer Cache Mechanism,
    IEICE Transactions on Information and Systems, Vol.J101-D, No.1, pp.46-56 (1, 2018). (in Japanese)
    DOI: 10.14923/transinfj.2017SKP0012

  15. Toshihiro Yamauchi, Yuta Ikegami, Yuya ban,
    Mitigating Use-After-Free Attacks using Memory-Reuse-Prohibited Library,
    IEICE Transactions on Information and Systems, Vol.E100-D, No.10, pp.2295-2306 (10, 2017).
    DOI: 10.1587/transinf.2016INP0020 copyright©2017 IEICE [PDF] [IEICE Transactions Online]

  16. Toshihiro Yamauchi, Yohei Akao,
    Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features,
    IEICE Transactions on Information and Systems, Vol.E100-D, No.10, pp.2377-2381 (10, 2017).
    DOI: 10.1587/transinf.2016INL0003 copyright©2017 IEICE [PDF] [IEICE Transactions Online]

  17. Yuichi Nakamura, Akira Moriguchi, Masanori Irie, Taizo Kinoshita, Toshihiro Yamauchi,
    Rule-based sensor data aggregation system for M2M gateways,
    IEICE Transactions on Information and Systems, Vol.E99-D, No.12, pp.2943-2955 (12, 2016).
    DOI: 10.1587/transinf.2016PAP0020 copyright©2016 IEICE [PDF] [IEICE Transactions Online]

  18. Hiroto Ebara, Keisuke Masuda, Toshihiro Yamauchi, Hideo Taniguchi,
    Implementation and Evaluation of the File Operation Function for Microkernel Structure Operating System Reducing Inter-Process Communications and Sharing Data,
    IEICE Transactions on Information and Systems, Vol.J99-D, No.10, pp.1069-1079 (10, 2016). (in Japanese)
    DOI: 10.14923/transinfj.2016JDP7013

  19. Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    Design of Function for Tracing Diffusion of Classified Information for IPC on KVM,
    Journal of Information Processing, Vol.24, No.5, pp.781-792 (9, 2016).
    DOI: 10.2197/ipsjjip.24.781 [PDF]

  20. Akiyoshi Tsuchiya, Toshihiro Yamauchi, Hideo Taniguchi
    Implementation and Evaluation of Partitioning Method of I/O Buffer Based on Cache Hit Ratio,
    IPSJ Journal, Vol.57, No.6, pp.1539-1533 (6, 2016). (in Japanese)

  21. Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    Evaluation and Design of Function for Tracing Diffusion of Classified Information for File Operations with KVM,
    The Journal of Supercomputing, Vol.72, Issue 5, pp.1841-1861 (2, 2016).
    DOI: 10.1007/s11227-016-1671-5 [PDF]

  22. Toshihiro Yamauchi, Masahiro Tsuruya, Hideo Taniguchi,
    Fast Control Method of Software-Managed TLB for Reducing Zero-Copy Communication Overhead,
    IEICE Transactions on Information and Systems, Vol.E98-D, No.12, pp.2187-2191 (12, 2015).
    DOI: 10.1587/transinf.2015PAL0003 copyright©2015 IEICE [PDF] [IEICE Transactions Online]

  23. Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi,
    Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems,
    Journal of Information Processing, Vol.23, No.5, pp.664-672 (9, 2015).
    DOI: 10.2197/ipsjjip.23.664 [PDF]

  24. Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    Process Hiding by Virtual Machine Monitor for Attack Avoidance,
    Journal of Information Processing, Vol.23, No.5, pp.673-682 (9, 2015).
    DOI: 10.2197/ipsjjip.23.673 [PDF]
    (Specially selected paper of JIP (Journal of Information Processing))

  25. Yoshiyuki Ogura, Toshihiro Yamauchi,
    Dynamic Control Method for Sending User Information using TaintDroid,
    IPSJ Journal, Vol.56, No.9, pp.1857-1867 (9, 2015). (in Japanese)

  26. Toshihiro Yamauchi, Kazutoshi Yokoyama, Yoshinari Nomura, Hideo Taniguchi, Masao Ashizuka,
    Setting Method of Opportunity of Updating File Importance on FFU,
    IPSJ Journal, Vol.56, No.6, pp.1451-1462 (6, 2015). (in Japanese)

  27. Jing Yu, Toshihiro Yamauchi,
    Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS,
    IEICE Transactions on Information and Systems, Vol.E98-D, No.4, pp.807-811 (4, 2015).
    DOI: 10.1587/transinf.2014ICL0001 copyright©2015 IEICE [PDF] [IEICE Transactions Online]

  28. Masaya Sato, Toshihiro Yamauchi,
    "Secure and Fast Log Transfer Mechanism for Virtual Machine,"
    Journal of Information Processing, Vol.22, No.4, pp.597-608 (10, 2014).
    DOI: 10.2197/ipsjjip.22.597 [PDF]

  29. Yuta Ikegami, Toshihiro Yamauchi,
    Proposal of Kernel Rootkits Detection Method by Comparing Kernel Stack ,
    IPSJ Journal, Vol.55, No.9, pp.2047-2060 (9, 2014). (in Japanese)

  30. Takahiro Yamamoto, Toshihiro Yamauchi, Hideo Taniguchi,
    Implementation of Multi-core Tender with Mutual Exclusion Localization Based on Mechanism of Resource Independence,
    IPSJ Transactions on Advanced Computing Systems, Vol.7, No.3, pp.25-36 (8, 2014). (in Japanese)

  31. Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi,
    DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android,
    Journal of Internet Services and Information Security (JISIS), Vol.4, No.2, pp.55-69 (5, 2014).
    JISIS [PDF]

  32. Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi,
    A New OS Structure for Simplifying Understanding of Operating System Behavior,
    INFORMATION-An International Interdisciplinary Journal, Vol.17, No.5, pp.1945-1950 (5, 2014). [draft]

  33. Masahiro Tsuruya, Toshihiro Yamauchi, Hideo Taniguchi,
    Implementation and Evaluation of Software Control Method for TLB on Microkernel OS,
    IEICE Transactions on Information and Systems, Vol.J97-D, No.1, pp.216-225 (1, 2014).

  34. Shinya Yagi, Toshihiro Yamauchi,
    Implementation of a Method for Dynamic Control of Application Programs by Extending SEAndroid ,
    IPSJ Journal, Vol.54, No.9, pp. 2220-2231 (9, 2013). (in Japanese)

  35. Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi,
    A mechanism for achieving a bound on execution performance of process group to limit CPU abuse,
    The Journal of Supercomputing, Vol.65, Issue 1, pp.38-60, (7, 2013).
    DOI: 10.1007/s11227-011-0707-0 [PDF]

  36. Akiyoshi Tsuchiya, Takahiro Matsubara, Toshihiro Yamauchi, Hideo Taniguchi,
    Proposal and Evaluation of Method to Set High Priority Directories for a Directory Oriented Buffer Cache Mechanism,
    IEICE Transactions on Information and Systems, Vol.J96-D, No.3, pp.506-518 (3, 2013).

  37. Ruo Ando, Masaki Hashimoto, Toshihiro Yamauchi,
    External Storage Mechanism for Preserving File Access Log with Virtualization Technology,
    IPSJ Journal, Vol.54, No.2, pp. 585-595 (2, 2013). (in Japanese)

  38. Kenta Fukushima, Toshihiro Yamauchi, Hideo Taniguchi,
    Implementation of Mechanism to Support Tracing Diffusion of Classified Information by Visualization and Filtering Function,
    IPSJ Journal, Vol.53, No.9, pp.2171-2181 (9, 2012). (in Japanese)

  39. Masaya Sato, Toshihiro Yamauchi,
    VMM-Based Log-Tampering and Loss Detection Scheme,
    Journal of Internet Technology, Vol.13, No.4, pp.655-666 (7, 2012).

  40. Toshihiro Yamauchi, Kenji Yamamoto,
    LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS,
    International Journal of Security and Its Applications (IJSIA), Vol.6, No.2, pp.81-89 (4, 2012) [PDF]

  41. Shinya Yagi, Yuichi Nakamura, Toshihiro Yamauchi,
    Proposal of a Method to Automatically Reduce Redundant Security Policy of SELinux,
    IPSJ Transactions on Advanced Computing Systems, Vol.5, No.2, pp.63-73 (3, 2012). (in Japanese)

  42. Hideaki Moriyama, Toshihiro Yamauchi, Yoshinari Nomura, Hideo Taniguchi,
    Implementation and Evaluation of a Method for CMP-Oriented Thread Scheduling Based on Continuation Model
    IEICE Transactions on Information and Systems, Vol.J95-D, No.3, pp.400-411 (3, 2012). (in Japanese)

  43. Masaya Sato, Toshihiro Yamauchi,
    Logging System to Prevent Tampering and Loss with Virtual Machine Monitor,"
    IPSJ Journal, Vol.53, No.2, pp.847-856 (2, 2012). (in Japanese)
    (IPSJ Best Paper Award)

  44. Toshihiro Yamauchi, Masahiro Uemura, Ryota Hatanaka
    Limiting Use of Tokens for Improvement of Bayesian Filter,
    IPSJ Journal, Vol.52, No.9, pp.2686-2696 (9, 2011). (in Japanese)

  45. Kenji Yamamoto, Toshihiro Yamauchi,
    Evaluation of Performance of Secure OS using Performance Evaluation Mechanism of LSMPMON,
    IPSJ Journal, Vol.52, No.9, pp.2596-2601 (9, 2011). (in Japanese)

  46. Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
    "Implementation and Evaluation for Sophisticated Periodic Execution Control in Embedded Systems,"
    International Journal of Control and Automation, vol.4, no.2, pp.59-78, (6, 2011). [PDF]

  47. Toshihiro Yamauchi, Kazuhiro Fukutomi, Hideo Taniguchi
    "ISIPC: Instant Synchronous Interprocess Communication,"
    Journal of Next Generation Information Technology, Vol.1, No.3, pp.75-83 (2010). [PDF]

  48. Naofumi Kado, Toshihiro Yamauchi, Hideo Taniguchi,
    Implementation and Evaluation of Zero-copy communication processing on physical memory exchange mechanism,
    IEICE Transactions on Information and Systems, Vol.J93-D, No.11, pp.2380-2389 (11, 2010). (in Japanese)

  49. Yutaka Shimazaki, Toshihiro Yamauchi, Yoshinari Nomura, Hideo Taniguchi,
    Converting Linux LKM Device Driver into Concrete Process in AnT Operating System,
    IEICE Transactions on Information and Systems, Vol.J93-D, No.10, pp.1990-2000 (10, 2010). (in Japanese)

  50. Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi,
    "SELinux Security Policy Configuration System with Higher Level Language,"
    Journal of Information Processing, Vol.18, pp.201-212 (9, 2010).
    DOI: 10.2197/ipsjjip.18.201 [PDF]
    (IPSJ, Journal of Information Processing Outstanding Paper Award)

  51. Tatsuya Katakami, Toshihiro Tabata, Hideo Taniguchi,
    Proposal of I/O Buffer Cache Mechanism Based on the Frequency of System Call of the File Operation,
    IPSJ Transactions on Advanced Computing Systems, Vol.3, No.1, pp.50-60 (3, 2010). (in Japanese) [Abstract]

  52. Toshihiro Tabata, Satoshi Hakomori, Kei Ohashi, Shinichiro Uemura, Kazutoshi Yokoyama, Hideo Taniguchi,
    Tracing Classified Information Diffusion for Protecting Information Leakage,
    IPSJ Journal, Vol.50, No.9, pp.2088-2102, (9, 2009). (in Japanese) [Abstract]

  53. Naoto MATSUDA, Kazuya SATO, Toshihiro TABATA, Seiji MUNETOH,
    Design and Implementation of Performance Evaluation Function of Secure OS Based on LSM,
    IEICE Transactions on Information and Systems, Vol.J92-D, No.7, pp.963-974 (7, 2009). (in Japanese)

  54. Toshihiro Tabata, Hideo Taniguchi,
    "Implementation and Evaluation of Heterogeneous Virtual Storage (HVS) on Tender Operating System,"
    IEICE Transactions on Information and Systems, Vol.J92-D, No.1, pp.12-24 (1, 2009). (in Japanese)

  55. Kenji Saeki, Toshihiro Tabata, Hideo Taniguchi,
    "Realization and Evaluation of High Speed fork & exec System-call by Recycling Resource on Tender,"
    IEICE Transactions on Information and Systems, Vol.J91-D, No.12, pp.2892-2303 (12, 2008). (in Japanese)

  56. Masahiro Uemura, Toshihiro Tabata,
    "A Bayesian-filter-based Image Spam Filtering Method,"
    IPSJ Journal, Vol.49, No.9, pp.3093-3103 (9, 2008). (in Japanese) [Abstract]

  57. Toshihiro Tabata, Miyuki Kotoge, Yoshinari Nomura, Hideo Taniguchi,
    "Implementation and Evaluation of a Directory Oriented Buffer Cache Mechanism,"
    IEICE Transactions on Information and Systems, Vol.J91-D, No.2, pp.435-448 (2, 2008). (in Japanese)

  58. Toshihiro Tabata, Hideo Taniguchi,
    "An Improved Recyclable Resource Management Method for Fast Process Creation and Reduced Memory Consumption,"
    International Journal of Hybrid Information Technology (IJHIT), Vol.1, No.1, pp.31-44, (1, 2008). [PDF]

  59. Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi,
    "A CPU Usage Control Mechanism for Processes with Execution Resource for Mitigating CPU DoS Attack,"
    International Journal of Smart Home (IJSH), Vol.1, No.2, pp. 109-128 (7, 2007). [PDF]

  60. Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai,
    "Active Modification Method of Program Control Flow for Efficient Anomaly Detection,"
    GESTS International Transactions on Computer Science and Engineering, Vol.31, No.1, pp.51-62 (5, 2006). [PDF]

  61. Amril Syalim, Toshihiro Tabata, Kouichi Sakurai:
    "Usage Control Model and Architecture for Data Confidentiality in Database Service Provider,"
    Online version: IPSJ Digital Courier, Vol.2, pp.39-44
    Paper version: IPSJ Journal, Vol.47, No.2, pp.621-626 (2, 2006).
    DOI: 10.2197/ipsjdc.2.39 [PDF]

  62. Kazuhide FUKUSHIMA, Toshihiro TABATA, Toshiaki TANAKA, Kouichi SAKURAI:
    "A Software Fingerprinting Scheme for Java Using Class Structure Transformation,"
    IPSJ Journal, Vol.46, No.8, pp.2042-2052 (8, 2005). (in Japanese) [Abstract]

  63. Kohei TATARA, Toshihiro TABATA, Kouichi SAKURAI:
    "The Design and Evaluation of Anomaly Detection System based on System Call,"
    IPSJ Journal, Vol.46, No.8, pp.1967-1975 (8, 2005). (in Japanese) [Abstract]

  64. Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
    "Proposal and Evaluation for Improvement of Corpus Separation in Bayesian Spam Filtering on Multi-Lingual Environment,"
    IPSJ Journal, Vol.46, No.8, pp.1959-1966 (8, 2005). (in Japanese) [Abstract]

  65. Toshihiro TABATA, Katsuya SUEYASU, Kouichi SAKURAI:
    "On the Security of Integration of SELinux Access Permissions,"
    IPSJ Journal, Vol.46, No.4, pp.1070-1073 (4, 2005). (in Japanese)

  66. Toshihiro Tabata, Yoshinari Nomura and Hideo Taniguchi:
    "A Mechanism of Regulating Execution Performance for Process Group by Execution Resource on Tender Operating System,"
    IEICE Transactions on Information and Systems, Vol.J87-D-I, No.11, pp.961-974, (11, 2004). (in Japanese)
    Toshihiro Tabata, Yoshinari Nomura and Hideo Taniguchi:
    "A Mechanism of Regulating Execution Performance for Process Group by Execution Resource on Tender Operating System,"
    Systems and Computers in Japan, Vol. 38, No. 4, pp.63-78, (12, 2007).
    DOI: 10.1002/scj.20403

  67. Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
    "Proposal of anti-spam scheme combining challenge-response and Bayesian filtering,"
    IPSJ Journal, Vol.45, No.8, pp.1939-1947 (8, 2004). (in Japanese)

  68. Toshihiro Tabata and Hideo Taniguchi:
    "Proposal of Efficient Resource Management for Recycling Process Elements,"
    IPSJ Transactions on Advanced Computing Systems, Vol.44, No.SIG 10(ACS2), pp.48-61 (7, 2003). (in Japanese)

  69. Toshihiro Tabata and Hideo Taniguchi:
    "Process Schedule Mechanism for Regulating Processing Time of Multiple Services,"
    IEICE Transactions on Information and Systems, Vol.J86-D-I, No.7, pp.458-468 (7, 2003). (in Japanese)

  70. Toshihiro Tabata and Hideo Taniguchi:
    "Proposal and Evaluation of Process Restart Function by Initializing Data Segments,"
    IPSJ Journal, Vol.44, No.6, pp.1538-1547 (6, 2003). (in Japanese)

  71. Hideo Taniguchi, Yoshinori Aoki, Masataka Goto, Daisuke Murakami and Toshihiro Tabata:
    "Tender Operating System based on Mechanism of Resource Independence,"
    IPSJ Journal, Vol.41, No.12, pp.3363-3374 (12, 2000). (in Japanese)

  72. Toshihiro Tabata and Hideo Taniguchi:
    "Guarantee of Service Processing Time by Execution on Tender Operating System,"
    IPSJ Journal, Vol.41, No.6, pp.1745-1754 (6, 2000). (in Japanese)

  73. Toshihiro Tabata and Hideo Taniguchi:
    "Implementation and Evaluation of Speed Control Mechanism of Program Execution on Resource Execution on Tender,"
    Transactions of Information Processing Society of Japan, Vol.40, No.6, pp.2523-2533 (6, 1999). (in Japanese)


< Book >
  1. Goichiro Hanaoka, Toshihiro Yamauchi,
    Advances in Information and Computer Security - IWSEC 2012,
    Lecture Notes in Computer Science, Vol.7631, Springer-Verlag (10, 2012).
    DOI: 10.1007/978-3-642-34117-5


< Other >
  1. Toshihiro Yamauchi,
    FOREWORD,
    IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp.785-786 (4, 2016).

  2. Toshihiro Yamauchi,
    Use-After-Free Prevention Method Using Memory Reuse Prohibited Library,
    The 10th International Workshop on Security (IWSEC 2015), Invited Talk (8, 2015).

  3. Toshihiro Tabata,
    "SPAM mail filtering: commentary of Bayesian filter,"
    The Journal of Information Science and Technology Association, Vol.56, No.10, pp.464-468, (10, 2006). (in Japanese). [Abstract]


< Refereed Conferences >
  1. Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
    Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM,
    The 9th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2020), (2020). (accepted)

  2. Hiroki Kuzuno, Toshihiro Yamauchi,
    MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption,
    15th International Workshop on Security (IWSEC 2020), Lecture Notes in Computer Science (LNCS), (9, 2020). (accepted)

  3. Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Celia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi,
    "Threat Analysis of Fake Virus Alerts Using WebView Monitor,"
    Proceedings of 2019 Seventh International Symposium on Computing and Networking (CANDAR), pp.28-36 (11, 2019).
    DOI: 10.1109/CANDAR.2019.00012

  4. Hiroki Kuzuno, Toshihiro Yamauchi,
    "KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism,"
    The 15th International Conference on Information Security Practice and Experience (ISPEC 2019), Lecture Notes in Computer Science (LNCS), vol.11879, pp.75-94 (11, 2019).
    DOI: 10.1007/978-3-030-34339-2_5

  5. Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi,
    "(Short Paper) A Method for Preventing Suspicious Web Access in Android WebView,"
    The 14th International Workshop on Security (IWSEC 2019),
    Lecture Notes in Computer Science (LNCS), vol.11689, pp.241-250 (8, 2019).
    DOI: 10.1007/978-3-030-26834-3_14

  6. Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura and Masaki Hashimoto,
    "Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes,"
    the 2018 IEEE Conference on Dependable and Secure Computing,
    Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2018), pp.172-179, (12, 2018).
    DOI: 10.1109/DESEC.2018.8625137

  7. Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi,
    "Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines,"
    6th International Workshop on Computer Systems and Architecture (CSA2018),
    Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW2018), pp.152-158, (11, 2018).
    DOI: 10.1109/CANDARW.2018.00035

  8. Yuya Ban, Toshihiro Yamauchi,
    "Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory,"
    5th International Workshop on Information and Communication Security (WICS 2018),
    Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp.398-404, (11, 2018).
    DOI: 10.1109/CANDARW.2018.00080

  9. Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
    Hiding File Manipulation of Essential Services by System Call Proxy,
    7th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2018), Lecture Notes on Data Engineering and Communications Technologies, vol.22, pp.853-863 (9, 2018).
    DOI: 10.1007/978-3-319-98530-5_76

  10. Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, ToshihiroYamauchi,
    Web Access Monitoring Mechanism for Android WebView,
    Australasian Information Security Conference (AISC 2018),
    Proceedings of the Australasian Computer Science Week Multiconference (ACSW'18), Article 1, 8 pages (1, 2018).
    DOI: 10.1145/3167918.3167942
    (Australasian Information Security Conference (AISC 2018), Best Paper Award)

  11. Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
    Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM,
    4th International Workshop on Information and Communication Security (WICS 2017),
    Proceedings of 2017 5th International Symposium on Computing and Networking (CANDAR 2017), pp.463-468, (11, 2017).
    DOI: 10.1109/CANDAR.2017.91

  12. Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin,
    Access Control for Plugins in Cordova-based Hybrid Applications,
    Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1063-1069, (3, 2017).
    DOI: 10.1109/AINA.2017.61 [PDF]

  13. Yohei Akao, Toshihiro Yamauchi,
    KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features,
    Proceedings of 2016 International Conference on Information Science and Security (ICISS), pp.22-26 (12, 2016).
    DOI: 10.1109/ICISSEC.2016.7885860 [PDF]

  14. Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services,
    3rd International Workshop on Information and Communication Security (WICS 2016),
    Proceedings of 2016 Fourth International Symposium on Computing and Networking (CANDAR 2016), pp.635-641 (11, 2016).
    DOI: 10.1109/CANDAR.2016.89 [PDF]

  15. Toshihiro Yamauchi, Yuta Ikegami,
    HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks,
    The 10th International Conference on Network and System Security (NSS 2016),
    Lecture Notes in Computer Science (LNCS), Vol.9955, pp.219-234 (9, 2016).
    DOI: 10.1007/978-3-319-46298-1_15 [PDF]]
    (The 10th International Conference on Network and System Security (NSS 2016), Best Paper Award)

  16. Toshihiro Yamauchi, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi,
    Plate: Persistent Memory Management for Nonvolatile Main Memory,
    Proceedings of 31st ACM Symposium on Applied Computing (SAC 2016), pp.1885-1892 (4, 2016).
    DOI: 10.1145/2851613.2851744 [PDF]

  17. Yuta Ikegami, Toshihiro Yamauchi,
    Attacker Investigation System Triggered by Information Leakage,
    6th International Conference on E-Service and Knowledge Management (ESKM 2015)
    Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.24-27 (7, 2015).
    DOI: 10.1109/IIAI-AAI.2015.247 [PDF]

  18. Yohei Akao, Toshihiro Yamauchi,
    Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features,
    Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.721-722 (7, 2015).
    DOI: 10.1109/IIAI-AAI.2015.243 [PDF]

  19. Shota Fujii, Toshihiro Yamauchi, Hideo Taniguchi,
    Design of a Function for Tracing the Diffusion of Classified Information for File Operations with a KVM,
    The 2015 International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA 2015), (2, 2015).
    [PDF]

  20. Yuichi Nakamura, Akira Moriguchi, Toshihiro Yamauchi,
    CSDA: Rule-based Complex Sensor Data Aggregation System for M2M Gateway,
    Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2015), pp.110-115 (1, 2015).
    DOI: 10.1109/ICMU.2015.7061051 [PDF]

  21. Kota Yoshizaki, Toshihiro Yamauchi,
    Malware Detection Method Focusing on Anti-Debugging Functions,
    1st International Workshop on Information and Communication Security (WICS'14),
    Proceedings of 2014 Second International Symposium on Computing and Networking (CANDAR 2014), pp.563-566 (12, 2014).
    DOI: 10.1109/CANDAR.2014.36 [PDF]

  22. Masaya Sato, Toshihiro Yamauchi,
    "Complicating Process Identification by Replacing Process Information for Attack Avoidance,"
    The 9th International Workshop on Security (IWSEC2014),
    Lecture Notes in Computer Science (LNCS), Vol.8639, pp.33-47 (8, 2014).
    DOI: 10.1007/978-3-319-09843-2_3 [PDF]

  23. Jing Yu, Toshihiro Yamauchi,
    Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS,
    Fourth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2013),
    Proceedings of 2013 IEEE International Conference on High PerformanceComputing and Communications (HPCC-2013) and 2013 IEEE InternationalConference on Embedded and Ubiquitous Computing (EUC-2013), pp.1628-1633, (11, 2013).
    DOI: 10.1109/HPCC.and.EUC.2013.229 [PDF]

  24. Masaya Sato, Toshihiro Yamauchi,
    Secure Log Transfer by Replacing a Library in a Virtual Machine,
    8th International Workshop on Security (IWSEC2013),
    Lecture Notes in Computer Science (LNCS), vol.8231, pp.1-18 (11, 2013).
    DOI: 10.1007/978-3-642-41383-4_1 [PDF]

  25. Takeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi,
    Evaluation of Load Balancing in Multicore Processor for AnT,
    2nd Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2013),
    Proceedings of the 2013 16th International Conference on Network-Based Information Systems, pp.360-365 (9, 2013).
    DOI: 10.1109/NBiS.2013.57 [PDF]

  26. Nobuto Otsubo, Shinichiro Uemura, Toshihiro Yamauchi, Hideo Taniguchi,
    Design and Evaluation of a Diffusion Tracing Function for Classified Information among Multiple Computers,
    7th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2013),
    Lecture Notes in Electrical Engineering (LNEE), Vol.240, pp.235-242 (5, 2013).
    DOI: 10.1007/978-94-007-6738-6_30 [PDF]

  27. Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi,
    DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android,
    7th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2013),
    Lecture Notes in Electrical Engineering (LNEE), Vol.240, pp.243-251 (5, 2013).
    DOI: 10.1007/978-94-007-6738-6_31 [PDF]

  28. Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
    Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling,
    Proceedings of the 2012 15th International Conference on Network-Based Information Systems, pp.459-464, (9, 2012).
    DOI: 10.1109/NBiS.2012.79 [PDF]

  29. Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi,
    Design of an OS Architecture that Simplifies Understanding of Operating System Behavior,
    Proceedings of 2012 International Conference on Information Technology and Computer Science (ITCS 2012), pp.51-58 (7, 2012).
    [PDF]

  30. Masaya Sato, Toshihiro Yamauchi,
    VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss,
    2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11),
    Lecture Notes in Computer Science (LNCS), Vol.6908, pp.176-190, (8, 2011).
    DOI: 10.1007/978-3-642-23300-5_14 [PDF]

  31. Hideaki Moriyama, Toshihiro Yamauchi, Hideo Taniguchi,
    "Control Method of Multiple Services for CMP Based on Continuation Model,"
    Proceedings of the 4th International Conference on Interaction Sciences: IT, Human and Digital Content (ICIS 2011), pp.83-89, (8, 2011).
    IEEE Xplore [PDF]

  32. Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi,
    A Mechanism that Bounds Execution Performance for Process Group for Mitigating CPU Abuse,
    2010 International Conference on Security Technology (SecTech2010),
    Communications in Computer and Information Science (CCIS), Vol.122, pp.84-93 (12, 2010).
    DOI: 10.1007/978-3-642-17610-4_10 [PDF]
    (The Second International Mega-Conference on Future Generation Information Technology (FGIT 2010), Best Paper Award)

  33. Kenji Yamamoto, Toshihiro Yamauchi,
    "Evaluation of Performance of Secure OS using Performance Evaluation Mechanism of LSM-based LSMPMON,"
    2010 International Conference on Security Technology (SecTech2010),
    Communications in Computer and Information Science (CCIS), Vol.122, pp.57-67 (12, 2010).
    DOI: 10.1007/978-3-642-17610-4_7 [PDF]

  34. Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
    Proposal for Sophisticated Periodic Execution Control in Embedded Systems,
    The 2nd International Conference on Advanced Science and Technology (AST2010), (6, 2010)
    Lecture Notes in Computer Science (LNCS), Vol.6485, pp.549-563 (12, 2010).

  35. Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata,
    "SEEdit: SELinux Security Policy Configuration System with Higher Level Language,"
    Proc. of 23rd Large Installation System Administration Conference (LISA '09), pp.107-117 (11, 2009). [PDF]

  36. Tatsuya Katakami, Toshihiro Tabata, Hideo Taniguchi,
    "I/O Buffer Cache Mechanism Based on the Frequency of File Usage,"
    Proc. of the third International Conference on Convergence and hybrid Information Technology (ICCIT2008), pp.76-82 (11, 2008).
    DOI: 10.1109/ICCIT.2008.107 [PDF]

  37. Toshihiro Tabata, Kazuhiro Fukutomi, Hideo Taniguchi,
    "Proposal of Instant Synchronous Interprocess Communication,"
    Proc. of the third International Conference on Convergence and hybrid Information Technology (ICCIT2008), pp.146-149 (11, 2008).
    DOI: 10.1109/ICCIT.2008.106

  38. Takuto Yamaguchi, Yuichi Nakamura, Toshihiro Tabata,
    "Integrated Access Permission: Secure and Simple Policy Description by Integration of File Access Vector Permission,"
    Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), pp.40-45 (4, 2008). [PDF]

  39. Masahiro Uemura, Toshihiro Tabata,
    "Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method,"
    Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), pp.46-51 (4, 2008).
    DOI: 10.1109/ISA.2008.84 [PDF]

  40. Toshihiro Tabata, Hideo Taniguchi,
    "A Recyclable Resource Management Method for Fast Process Creation and Reduced Memory Consumption,"
    Proceedings of the 2007 International Conference on Intelligent Pervasive Computing IPC-07, pp.194-199, (10, 2007). [PDF]

  41. Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi:
    "Controlling CPU Usage for Processes with Execution Resource for Mitigating CPU DoS Attack,"
    Proc. of 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007)
    (The 2007 International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing 2007 (IMIS2007)), pp.141-146, (4, 2007). [PDF]

  42. Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
    "An Intrusion Detection System which can Restore Altered Data,"
    Proc. of 4th International Conference in IT and Applications (ICITA2007), pp.29-34 (1, 2007).
    [PDF]

  43. Toshihiro Tabata Miyuki Kotoge, Kei Saitou, Yoshinari Nomura, Hideo Taniguchi:
    "Directory Oriented Buffer Cache Mechanism,"
    IPSJ Computer System Symposium, Vol.2006, No.14, pp.53-62 (11, 2006). (in Japanese)

  44. Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai,
    "Actively Modifying Control Flow of Program for Efficient Anormaly Detection,"
    10th International Conference on Knowledge-Based & Intelligent Information & Engineering Systems (KES 2006),
    Lecture Notes in Computer Science (LNCS), Vol.4252, pp.737-744, (10, 2006) [PDF]

  45. Takuto Yamaguchi, Yuichi Nakamura, Toshihiro TABATA:
    "Proposal of File Access Permission which has both Security and Simplified Configuration,"
    PreProc. of the 7th International Workshop on Information Security Applications (WISA2006), pp.151-161 (8, 2006).

  46. Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
    "An Intrusion Detection System using Alteration of Data,"
    Proc. of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vol.1, pp.243-248 (4, 2006). [PDF]

  47. Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai:
    "Program Obfuscation Scheme using Random Numbers to Complicate Control Flow,"
    Proc. of the First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05), pp.916-925,
    Lecture Notes in Computer Science (LNCS), Vol.3823, pp.916-925, (12, 2005).

  48. Toshihiro TABATA, Satoshi Hakomori, Hideo Taniguchi:
    "An Abuse Prevention Technique of CPU Time by Using Execution Resource,"
    PreProc. of the 6th International Workshop on Information Security Applications (WISA2005), pp.413-420 (8, 2005).

  49. Amril Syalim, Toshihiro Tabata, Kouichi Sakurai
    "Usage Control Model and Architecture for Data Confidentiality in Database Service Provider,"
    Proc. of Indonesia Cryptology and Information Security Conference (INA-CISC) 2005, pp.155-160 (3, 2005). [PDF]

  50. Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI:
    "End-User Security Management with Mobile Agents,"
    Proc. of the Third International Conference on Information (Info'2004), International Workshop on Information Assurance and Security, pp.286-289 (12, 2004). [PDF]

  51. Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
    "Some fitting of naive Bayesian spam filtering for Japanese environment,"
    PreProc. of Workshop on Information Security Applications (WISA2004), pp.175-183 (8, 2004). [PDF]

  52. Kohei TATARA, Toshihiro TABATA, Kouichi SAKURAI:
    "A Probabilistic Method for Detecting Anomalous Program Behavior,"
    PreProc. of Workshop on Information Security Applications (WISA2004), pp.105-115 (8, 2004). [PDF]

  53. Toshihiro TABATA, Kouichi SAKURAI:
    "Design of Intrusion Detection System at User Level with System-call Interposing,"
    Proc. of 1st International Conference on E-business and Telecommunication Networks (ICETE2004), Vol.2, pp.263-268 (8, 2004). [PDF]

  54. Toshihiro TABATA, Hideo TANIGUCHI:
    "Proposal and Implementation of Heterogeneous Virtual Storage Coexisted of Single Virtual Storage and Multiple Virtual Storage,"
    Proc. of International Conference on Computing, Communications and Control Technologies (CCCT'04), Vol.I, pp.415-420 (8, 2004). [PDF]

  55. Toshihiro TABATA, Hideo TANIGUCHI:
    "A Resource Management Method for Improving Recycling Ratio in Recycling Process Elements,"
    The 8th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2004), Vol.V, pp.203-208 (7, 2004). [PDF]

  56. Katsuya SUEYASU, Toshihiro TABATA, Kouichi SAKURAI:
    "On the Security of SELinux with a Simplified Policy,"
    Proc. of IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), pp.79-84 (12, 2003). [PDF]

  57. Kazuhide FUKUSHIMA, Toshihiro TABATA, Kouichi SAKURAI:
    "Evaluation of Obfuscation Scheme Focusing on Calling Relationships of Fields and Methods in Metrics,"
    Proc. of IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), pp.108-113 (12, 2003). [PDF]

  58. Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
    "Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response,"
    Proc. of IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), pp.214-219 (12, 2003). [PDF]

  59. Kazuhide FUKUSHIMA, Toshihiro TABATA, Kouichi SAKURAI:
    "Proposal and Evaluation of Obfuscation Scheme for Java Source Codes by Partial Destruction of Encapsulation,"
    Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.389-392 (11, 2003). [PDF]

  60. Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
    "Preventing Spam Disguised as Error Mail,"
    Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.609-611 (11, 2003). [PDF]

  61. Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI:
    "Route Detecting System using Multi-Agent for Mobile Agents,"
    Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.617-620 (11, 2003). [PDF]

  62. Toshihiro TABATA, Yoshinari NOMURA and Hideo TANIGUCHI:
    "Evaluation of Communication Bandwidth Control Mechanism by Regulating Program Execution Speed,"
    Proc. of 7th IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2003), pp.14-19 (8, 2003). [PDF]

  63. Toshihiro Tabata and Hideo Taniguchi:
    "Efficient Resource Management for Recycling Process Elements,"
    IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.2002, No.18, pp.21-28 (2002). (in Japanese)

  64. Toshihiro Tabata, Yoshinari Nomura and Hideo Taniguchi:
    "Guarantee of Service Processing Time of Process Group for Multimedia Application,"
    Proc. of Pan-Yellow-Sea International Workshop on Information Technologies for Network Era (PYIWIT'02), pp.104-111 (2002). [PDF]

  65. Toshihiro Tabata, Hideo Taniguchi and Kazuo Ushijima:
    Implementation and Evaluation of Multiple Processes Control Mechanism for Regulating Program Execution Speed,"
    Proc. of International Symposium on Principles of Software Evolution (ISPSE 2000), pp.315-319 (2000). [PDF]

  66. Toshihiro Tabata and Hideo Taniguchi:
    "Proposal and Evaluation of function for Restarting Process,"
    IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.2000, No.13, pp.91-98 (2000). (in Japanese)

  67. Toshihiro Tabata and Hideo Taniguchi:
    "Guarantee of Service Processing Time by execution on Tender,"
    IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.99, No.16, pp.33-40 (1999). (in Japanese)

  68. Toshihiro Tabata and Hideo Taniguchi:
    "Implementation and Evaluation of Process Execution Mechanism on Tender,"
    IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.98, No.15, pp.87-94 (1998). (in Japanese)


< Memoir >
  1. Toshihiro Tabata and Hideo Taniguchi:
    "Implementation and Evaluation of Mechanism of Restarting a Process by Initializing Data Segments,"
    Research Reports on Information Science and Electrical Engineering of Kyushu University, Vol.5, No.2, pp.237-242 (2000). (in Japanese)


< Others >


Back